Jurgen Weigert discovered a directory traversal flaw in fastjar. An
attacker could create a malicious JAR file which, if unpacked using
fastjar, could write to any files the victim had write access to.
(CVE-2006-3619)

These updated packages also fix several bugs, including :

* two debug information generator bugs

* two internal compiler errors

In addition to this, protoize.1 and unprotoize.1 manual pages have
been added to the package and __cxa_get_exception_ptr@@CXXABI_1.3.1
symbol has been added into libstdc++.so.6.

For full details regarding all fixed bugs, refer to the package
changelog as well as the specified list of bug reports from bugzilla.

All users of gcc should upgrade to these updated packages, which
contain backported patches to resolve these issues.

Contact

The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.